BibTeX records: Shukor Abd Razak

download as .bib file

@article{DBLP:journals/access/MaricanRSO23,
  author       = {Mohamed Noordin Yusuff Marican and
                  Shukor Abd Razak and
                  Ali Selamat and
                  Siti Hajar Othman},
  title        = {Cyber Security Maturity Assessment Framework for Technology Startups:
                  {A} Systematic Literature Review},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {5442--5452},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2022.3229766},
  doi          = {10.1109/ACCESS.2022.3229766},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaricanRSO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GohariARSRG22,
  author       = {Adel Gohari and
                  Anuar Bin Ahmad and
                  Ruzairi Bin Abdul Rahim and
                  Abu Sahmah M. Supa'at and
                  Shukor Abd Razak and
                  Mohammed Salih Mohammed Gismalla},
  title        = {Involvement of Surveillance Drones in Smart Cities: {A} Systematic
                  Review},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {56611--56628},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3177904},
  doi          = {10.1109/ACCESS.2022.3177904},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GohariARSRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZakiARGA22,
  author       = {Faiz Zaki and
                  Firdaus Afifi and
                  Shukor Abd Razak and
                  Abdullah Gani and
                  Nor Badrul Anuar},
  title        = {{GRAIN:} Granular multi-label encrypted traffic classification using
                  classifier chain},
  journal      = {Comput. Networks},
  volume       = {213},
  pages        = {109084},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109084},
  doi          = {10.1016/J.COMNET.2022.109084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZakiARGA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZubairRNAYESA22,
  author       = {Ajoze Abdulraheem Zubair and
                  Shukor Abd Razak and
                  Md. Asri Ngadi and
                  Arafat Al{-}Dhaqm and
                  Wael M. S. Yafooz and
                  Abdel{-}Hamid M. Emara and
                  Aldosary Saad and
                  Hussain Al{-}Aqrabi},
  title        = {A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm
                  {(AI)} for Optimal Task Scheduling},
  journal      = {Sensors},
  volume       = {22},
  number       = {4},
  pages        = {1674},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22041674},
  doi          = {10.3390/S22041674},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZubairRNAYESA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieaaie/HameedSLRK22,
  author       = {Shilan S. Hameed and
                  Ali Selamat and
                  Liza Abdul Latiff and
                  Shukor Abd Razak and
                  Ondrej Krejcar},
  editor       = {Hamido Fujita and
                  Philippe Fournier{-}Viger and
                  Moonis Ali and
                  Yinglin Wang},
  title        = {{WHTE:} Weighted Hoeffding Tree Ensemble for Network Attack Detection
                  at Fog-IoMT},
  booktitle    = {Advances and Trends in Artificial Intelligence. Theory and Practices
                  in Artificial Intelligence - 35th International Conference on Industrial,
                  Engineering and Other Applications of Applied Intelligent Systems,
                  {IEA/AIE} 2022, Kitakyushu, Japan, July 19-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13343},
  pages        = {485--496},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08530-7\_41},
  doi          = {10.1007/978-3-031-08530-7\_41},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ieaaie/HameedSLRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/HameedSLRK22,
  author       = {Shilan S. Hameed and
                  Ali Selamat and
                  Liza Abdul Latiff and
                  Shukor Abd Razak and
                  Ondrej Krejcar},
  editor       = {Hamido Fujita and
                  Yutaka Watanobe and
                  Takuya Azumi},
  title        = {Multi-Classification of Imbalance Worm Ransomware in the IoMT System},
  booktitle    = {New Trends in Intelligent Software Methodologies, Tools and Techniques
                  - Proceedings of the 21st International Conference on New Trends in
                  Intelligent Software Methodologies, Tools and Techniques, SoMeT 2022,
                  Kitakyushu, Japan, 20-22 September, 2022},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {355},
  pages        = {531--541},
  publisher    = {{IOS} Press},
  year         = {2022},
  url          = {https://doi.org/10.3233/FAIA220282},
  doi          = {10.3233/FAIA220282},
  timestamp    = {Mon, 30 Jan 2023 10:38:11 +0100},
  biburl       = {https://dblp.org/rec/conf/somet/HameedSLRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aada/AlsoufiRSAANA21,
  author       = {Muaadh A. Alsoufi and
                  Shukor Abd Razak and
                  Maheyzah Md Siraj and
                  Bander Ali Saleh Al{-}rimy and
                  Abdul{-}Rahman Al{-}Ali and
                  Maged Nasser and
                  Salah Abdo},
  title        = {A Review of Anomaly Intrusion Detection Systems in IoT using Deep
                  Learning Techniques},
  journal      = {Adv. Data Sci. Adapt. Anal.},
  volume       = {13},
  number       = {3{\&}4},
  pages        = {2143001:1--2143001:21},
  year         = {2021},
  url          = {https://doi.org/10.1142/S2424922X21430014},
  doi          = {10.1142/S2424922X21430014},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aada/AlsoufiRSAANA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmIKRGCAA21,
  author       = {Arafat Al{-}Dhaqm and
                  Richard Adeyemi Ikuesan and
                  Victor R. Kebande and
                  Shukor Abd Razak and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo and
                  Bander Ali Saleh Al{-}Rimy and
                  Abdul Rahman A. Alsewari},
  title        = {Digital Forensics Subdomains: The State of the Art and Future Directions},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {152476--152502},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3124262},
  doi          = {10.1109/ACCESS.2021.3124262},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmIKRGCAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/GhalebABSKRR21,
  author       = {Fuad A. Ghaleb and
                  Bander Ali Saleh Al{-}Rimy and
                  Wadii Boulila and
                  Faisal Saeed and
                  Maznah Kamat and
                  Mohd. Foad Rohani and
                  Shukor Abd Razak},
  title        = {Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment
                  Technique for Node Starvation Problem in Wireless Mesh Networks},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {2977954:1--2977954:19},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/2977954},
  doi          = {10.1155/2021/2977954},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cin/GhalebABSKRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhalafMMMMAREM21,
  author       = {Bashar Ahmad Khalaf and
                  Salama A. Mostafa and
                  Aida Mustapha and
                  Mazin Abed Mohammed and
                  Moamin A. Mahmoud and
                  Bander Ali Saleh Al{-}Rimy and
                  Shukor Abd Razak and
                  Mohamed Elhoseny and
                  Adam Marks},
  title        = {An Adaptive Protection of Flooding Attacks Model for Complex Network
                  Environments},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5542919:1--5542919:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5542919},
  doi          = {10.1155/2021/5542919},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhalafMMMMAREM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HameedSLRKFAO21,
  author       = {Shilan S. Hameed and
                  Ali Selamat and
                  Liza Abdul Latiff and
                  Shukor Abd Razak and
                  Ondrej Krejcar and
                  Hamido Fujita and
                  Mohammad Nazir Ahmad and
                  Sigeru Omatu},
  title        = {A Hybrid Lightweight System for Early Attack Detection in the IoMT
                  Fog},
  journal      = {Sensors},
  volume       = {21},
  number       = {24},
  pages        = {8289},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21248289},
  doi          = {10.3390/S21248289},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HameedSLRKFAO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RazakNA20,
  author       = {Shukor Abd Razak and
                  Nur Hafizah Mohd Nazari and
                  Arafat Mohammed Rashad Al{-}Dhaqm},
  title        = {Data Anonymization Using Pseudonym System to Preserve Data Privacy},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {43256--43264},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2977117},
  doi          = {10.1109/ACCESS.2020.2977117},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RazakNA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmROAGRM20,
  author       = {Arafat Mohammed Rashad Al{-}Dhaqm and
                  Shukor Abd Razak and
                  Siti Hajar Othman and
                  Abdul{-}Rahman Al{-}Ali and
                  Fuad A. Ghaleb and
                  Arief Salleh Rosman and
                  Nurazmallail Marni},
  title        = {Database Forensic Investigation Process Models: {A} Review},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {48477--48490},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2976885},
  doi          = {10.1109/ACCESS.2020.2976885},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmROAGRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmRDCSIAK20,
  author       = {Arafat Mohammed Rashad Al{-}Dhaqm and
                  Shukor Abd Razak and
                  David A. Dampier and
                  Kim{-}Kwang Raymond Choo and
                  Kamran Siddique and
                  Adeyemi Richard Ikuesan and
                  Abdulhadi Alqarni and
                  Victor R. Kebande},
  title        = {Categorization and Organization of Database Forensic Investigation
                  Processes},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {112846--112858},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3000747},
  doi          = {10.1109/ACCESS.2020.3000747},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmRDCSIAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmRSIK20,
  author       = {Arafat Mohammed Rashad Al{-}Dhaqm and
                  Shukor Abd Razak and
                  Kamran Siddique and
                  Richard Adeyemi Ikuesan and
                  Victor R. Kebande},
  title        = {Towards the Development of an Integrated Incident Response Model for
                  Database Forensic Investigation Field},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {145018--145032},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3008696},
  doi          = {10.1109/ACCESS.2020.3008696},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmRSIK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmRIKS20,
  author       = {Arafat Mohammed Rashad Al{-}Dhaqm and
                  Shukor Abd Razak and
                  Richard Adeyemi Ikuesan and
                  Victor R. Kebande and
                  Kamran Siddique},
  title        = {A Review of Mobile Forensic Investigation Process Models},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {173359--173375},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3014615},
  doi          = {10.1109/ACCESS.2020.3014615},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmRIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/irict/AlsoufiRSANA20,
  author       = {Muaadh A. Alsoufi and
                  Shukor Abd Razak and
                  Maheyzah Md Siraj and
                  Abdulalem Ali and
                  Maged Nasser and
                  Salah Abdo},
  editor       = {Faisal Saeed and
                  Fathey Mohammed and
                  Abdulaziz Al{-}Nahari},
  title        = {Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques:
                  {A} Survey},
  booktitle    = {Innovative Systems for Intelligent Health Informatics - Data Science,
                  Health Informatics, Intelligent Systems, Smart Computing, {IRICT}
                  2020, Langkawi, Malaysia, 21-22 December 2020},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {72},
  pages        = {659--675},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70713-2\_60},
  doi          = {10.1007/978-3-030-70713-2\_60},
  timestamp    = {Sat, 06 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/irict/AlsoufiRSANA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-09655,
  author       = {Fuad A. Ghaleb and
                  Bander Ali Saleh Al{-}rimy and
                  Maznah Kamat and
                  Mohd. Foad Rohani and
                  Shukor Abd Razak},
  title        = {Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment
                  Technique for Nodes Starvation Problem in Wireless Mesh Network},
  journal      = {CoRR},
  volume       = {abs/2006.09655},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.09655},
  eprinttype    = {arXiv},
  eprint       = {2006.09655},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-09655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/AdeyemiRVS19,
  author       = {Adeyemi Richard Ikuesan and
                  Shukor Abd Razak and
                  Hein S. Venter and
                  Mazleena Salleh},
  title        = {Polychronicity tendency-based online behavioral signature},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {10},
  number       = {8},
  pages        = {2103--2118},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13042-017-0748-7},
  doi          = {10.1007/S13042-017-0748-7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlc/AdeyemiRVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/RashidR19,
  author       = {Salman Rashid and
                  Shukor Abd Razak},
  title        = {Big Data Challenges in 5G Networks},
  booktitle    = {Eleventh International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2019, Zagreb, Croatia, July 2-5, 2019},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICUFN.2019.8806076},
  doi          = {10.1109/ICUFN.2019.8806076},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/RashidR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/irict/ZubairRNAM19,
  author       = {Ajoze Abdulraheem Zubair and
                  Shukor bin Abd Razak and
                  Md. Asri Bin Ngadi and
                  Ahmed Aliyu and
                  Syed Hamid Hussain Madni},
  editor       = {Faisal Saeed and
                  Fathey Mohammed and
                  Nadhmi Gazem},
  title        = {Convergence-Based Task Scheduling Techniques in Cloud Computing: {A}
                  Review},
  booktitle    = {Emerging Trends in Intelligent Computing and Informatics - Data Science,
                  Intelligent Information Systems and Smart Computing, International
                  Conference of Reliable Information and Communication Technology, {IRICT}
                  2019, Johor, Malaysia, 22-23 September, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1073},
  pages        = {227--234},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33582-3\_22},
  doi          = {10.1007/978-3-030-33582-3\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/irict/ZubairRNAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/irict/AbdallahRG19,
  author       = {Abdallah Elhigazi Abdallah and
                  Shukor Abd Razak and
                  Fuad A. Ghaleb},
  editor       = {Faisal Saeed and
                  Fathey Mohammed and
                  Nadhmi Gazem},
  title        = {Deauthentication and Disassociation Detection and Mitigation Scheme
                  Using Artificial Neural Network},
  booktitle    = {Emerging Trends in Intelligent Computing and Informatics - Data Science,
                  Intelligent Information Systems and Smart Computing, International
                  Conference of Reliable Information and Communication Technology, {IRICT}
                  2019, Johor, Malaysia, 22-23 September, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1073},
  pages        = {857--866},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33582-3\_81},
  doi          = {10.1007/978-3-030-33582-3\_81},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/irict/AbdallahRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/ChizariRMS18,
  author       = {Hassan Chizari and
                  Shukor Abd Razak and
                  Mojib Majidi and
                  Shaharuddin Salleh},
  title        = {Computer forensic problem of sample size in file type analysis},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {11},
  number       = {1/2},
  pages        = {58--74},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJAIP.2018.10013460},
  doi          = {10.1504/IJAIP.2018.10013460},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaip/ChizariRMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmROCGAA17,
  author       = {Arafat Mohammed Rashad Al{-}Dhaqm and
                  Shukor Abd Razak and
                  Siti Hajar Othman and
                  Kim{-}Kwang Raymond Choo and
                  William Bradley Glisson and
                  Abdul{-}Rahman Al{-}Ali and
                  Mohammad Al{-}Rousan},
  title        = {{CDBFIP:} Common Database Forensic Investigation Processes for Internet
                  of Things},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {24401--24416},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2762693},
  doi          = {10.1109/ACCESS.2017.2762693},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmROCGAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/AdeyemiRVS17,
  author       = {Richard Adeyemi Ikuesan and
                  Shukor Abd Razak and
                  Hein S. Venter and
                  Mazleena Salleh},
  title        = {High-level online user attribution model based on human Polychronic-Monochronic
                  tendency},
  booktitle    = {2017 {IEEE} International Conference on Big Data and Smart Computing,
                  BigComp 2017, Jeju Island, South Korea, February 13-16, 2017},
  pages        = {445--450},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/BIGCOMP.2017.7881753},
  doi          = {10.1109/BIGCOMP.2017.7881753},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigcomp/AdeyemiRVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AdeyemiRS17,
  author       = {Richard Adeyemi Ikuesan and
                  Shukor Abd Razak and
                  Mazleena Salleh},
  title        = {A Conceptual Model for Holistic Classification of Insider},
  journal      = {CoRR},
  volume       = {abs/1706.05402},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.05402},
  eprinttype    = {arXiv},
  eprint       = {1706.05402},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AdeyemiRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fiict/AdeyemiRS16,
  author       = {Adeyemi R. Ikuesan and
                  Shukor Abd Razak and
                  Mazleena Salleh},
  title        = {Understanding Online Behavior: Exploring the Probability of Online
                  Personality Trait Using Supervised Machine-Learning Approach},
  journal      = {Frontiers {ICT}},
  volume       = {3},
  pages        = {8},
  year         = {2016},
  url          = {https://doi.org/10.3389/fict.2016.00008},
  doi          = {10.3389/FICT.2016.00008},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fiict/AdeyemiRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/DezfouliRWRT15,
  author       = {Behnam Dezfouli and
                  Marjan Radi and
                  Kamin Whitehouse and
                  Shukor Abd Razak and
                  Hwee Pink Tan},
  title        = {{DICSA:} Distributed and concurrent link scheduling algorithm for
                  data gathering in wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {25},
  pages        = {54--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2014.09.011},
  doi          = {10.1016/J.ADHOC.2014.09.011},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/DezfouliRWRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/RadiDBRL15,
  author       = {Marjan Radi and
                  Behnam Dezfouli and
                  Kamalrulnizam Abu Bakar and
                  Shukor Abd Razak and
                  Malrey Lee},
  title        = {{LINKORD:} link ordering-based data gathering protocol for wireless
                  sensor networks},
  journal      = {Computing},
  volume       = {97},
  number       = {3},
  pages        = {205--236},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00607-014-0414-9},
  doi          = {10.1007/S00607-014-0414-9},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/RadiDBRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/DezfouliRRTB15,
  author       = {Behnam Dezfouli and
                  Marjan Radi and
                  Shukor Abd Razak and
                  Hwee Pink Tan and
                  Kamalrulnizam Abu Bakar},
  title        = {Modeling low-power wireless communications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {51},
  pages        = {102--126},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jnca.2014.02.009},
  doi          = {10.1016/J.JNCA.2014.02.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/DezfouliRRTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChizariPRAS14,
  author       = {Hassan Chizari and
                  Timothy Poston and
                  Shukor Abd Razak and
                  Abdul Hanan Abdullah and
                  Shaharuddin Salleh},
  title        = {Local coverage measurement algorithm in GPS-free wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {23},
  pages        = {1--17},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.adhoc.2014.05.015},
  doi          = {10.1016/J.ADHOC.2014.05.015},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChizariPRAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/RadiDBRL14,
  author       = {Marjan Radi and
                  Behnam Dezfouli and
                  Kamalrulnizam Abu Bakar and
                  Shukor Abd Razak and
                  Malrey Lee},
  title        = {Network Initialization in Low-Power Wireless Networks: {A} Comprehensive
                  Study},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {8},
  pages        = {1238--1261},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt074},
  doi          = {10.1093/COMJNL/BXT074},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/RadiDBRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DezfouliRRWBT14,
  author       = {Behnam Dezfouli and
                  Marjan Radi and
                  Shukor Abd Razak and
                  Kamin Whitehouse and
                  Kamalrulnizam Abu Bakar and
                  Hwee{-}Pink Tan},
  title        = {Improving broadcast reliability for neighbor discovery, link estimation
                  and collection tree construction in wireless sensor networks},
  journal      = {Comput. Networks},
  volume       = {62},
  pages        = {101--121},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.01.002},
  doi          = {10.1016/J.COMNET.2014.01.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DezfouliRRWBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/EissaRKS14,
  author       = {Tameem Eissa and
                  Shukor Abd Razak and
                  Rashid Hafeez Khokhar and
                  Normalia Samian},
  title        = {Erratum to: Trust-Based Routing Mechanism in {MANET:} Design and Implementation},
  journal      = {Mob. Networks Appl.},
  volume       = {19},
  number       = {5},
  pages        = {682},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11036-013-0486-3},
  doi          = {10.1007/S11036-013-0486-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/EissaRKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/RadiDBRT14,
  author       = {Marjan Radi and
                  Behnam Dezfouli and
                  Kamalrulnizam Abu Bakar and
                  Shukor Abd Razak and
                  Hwee Pink Tan},
  title        = {{IM2PR:} interference-minimized multipath routing protocol for wireless
                  sensor networks},
  journal      = {Wirel. Networks},
  volume       = {20},
  number       = {7},
  pages        = {1807--1823},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11276-014-0710-5},
  doi          = {10.1007/S11276-014-0710-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/RadiDBRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/GhoreishiRIC14,
  author       = {Seyed{-}Mohsen Ghoreishi and
                  Shukor Abd Razak and
                  Ismail Fauzi Isnin and
                  Hassan Chizari},
  title        = {Security evaluation over lightweight cryptographic protocols},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013116},
  doi          = {10.1109/ISBAST.2014.7013116},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/GhoreishiRIC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/GhoreishiRIC14a,
  author       = {Seyed{-}Mohsen Ghoreishi and
                  Shukor Abd Razak and
                  Ismail Fauzi Isnin and
                  Hassan Chizari},
  title        = {New secure identity-based and certificateless authenticated Key Agreement
                  protocols without pairings},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {188--192},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013119},
  doi          = {10.1109/ISBAST.2014.7013119},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/GhoreishiRIC14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/AdeyemiRS14,
  author       = {Adeyemi R. Ikuesan and
                  Shukor Abd Razak and
                  Mazleena Salleh},
  title        = {A psychographic framework for online user identification},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {198--203},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013121},
  doi          = {10.1109/ISBAST.2014.7013121},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/AdeyemiRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/SamsiR14,
  author       = {Muhammad Syafiq bin Samsi and
                  Shukor Abd Razak},
  title        = {A mechanism for privacy preserving in healthcare organizations},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {208--213},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013123},
  doi          = {10.1109/ISBAST.2014.7013123},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/SamsiR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/GhoreishiRIC14b,
  author       = {Seyed{-}Mohsen Ghoreishi and
                  Shukor Abd Razak and
                  Ismail Fauzi Isnin and
                  Hassan Chizari},
  title        = {Rushing attack against routing protocols in Mobile Ad-Hoc Networks},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {220--224},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013125},
  doi          = {10.1109/ISBAST.2014.7013125},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/GhoreishiRIC14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/Al-DhaqmORN14,
  author       = {Arafat Mohammed Rashad Al{-}Dhaqm and
                  Siti Hajar Othman and
                  Shukor Abd Razak and
                  Md. Asri Ngadi},
  title        = {Towards adapting metamodelling technique for database forensics investigation
                  domain},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {322--327},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013142},
  doi          = {10.1109/ISBAST.2014.7013142},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/Al-DhaqmORN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/Razak14,
  author       = {Shukor Abd Razak},
  title        = {Preface},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {iii},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013080},
  doi          = {10.1109/ISBAST.2014.7013080},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/Razak14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/AnisiACR13,
  author       = {Mohammad Hossein Anisi and
                  Abdul Hanan Abdullah and
                  Yahaya Coulibaly and
                  Shukor Abd Razak},
  title        = {{EDR:} efficient data routing in wireless sensor networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {12},
  number       = {1},
  pages        = {46--55},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJAHUC.2013.051390},
  doi          = {10.1504/IJAHUC.2013.051390},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/AnisiACR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/ZakiNKR13,
  author       = {Salim M. Zaki and
                  Md. Asri Ngadi and
                  Maznah Kamat and
                  Shukor Abd Razak},
  title        = {Quorum-based location service protocol for vehicular ad hoc networks
                  in urban environment},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {14},
  number       = {1},
  pages        = {27--43},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJAHUC.2013.056272},
  doi          = {10.1504/IJAHUC.2013.056272},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/ZakiNKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AdeyemiRA13,
  author       = {Adeyemi R. Ikuesan and
                  Shukor Abd Razak and
                  Nor Amira Nor Azhan},
  title        = {A Review of Current Research in Network Forensic Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {1},
  pages        = {1--26},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013010101},
  doi          = {10.4018/JDCF.2013010101},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AdeyemiRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/EissaRKS13,
  author       = {Tameem Eissa and
                  Shukor Abd Razak and
                  Rashid Hafeez Khokhar and
                  Normalia Samian},
  title        = {Trust-Based Routing Mechanism in {MANET:} Design and Implementation},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {5},
  pages        = {666--677},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-011-0328-0},
  doi          = {10.1007/S11036-011-0328-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/EissaRKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AnisiAR13,
  author       = {Mohammad Hossein Anisi and
                  Abdul Hanan Abdullah and
                  Shukor Abd Razak},
  title        = {Energy-efficient and reliable data delivery in wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {19},
  number       = {4},
  pages        = {495--505},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11276-012-0480-x},
  doi          = {10.1007/S11276-012-0480-X},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/AnisiAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/SamsiR13,
  author       = {Muhammad Syafiq bin Samsi and
                  Shukor bin Abd Razak},
  title        = {A review of anonymous authentication mechanisms for health information
                  management systems},
  booktitle    = {13th International Conference on Intellient Systems Design and Applications,
                  {ISDA} 2013, Salangor, Malaysia, December 8-10, 2013},
  pages        = {341--346},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISDA.2013.6920761},
  doi          = {10.1109/ISDA.2013.6920761},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/isda/SamsiR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/RazakM13,
  author       = {Shukor bin Abd Razak and
                  Ahmad Fahrulrazie Bin Mohamad},
  title        = {Identification of spam email based on information from email header},
  booktitle    = {13th International Conference on Intellient Systems Design and Applications,
                  {ISDA} 2013, Salangor, Malaysia, December 8-10, 2013},
  pages        = {347--353},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISDA.2013.6920762},
  doi          = {10.1109/ISDA.2013.6920762},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isda/RazakM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/EslaminejadRS12,
  author       = {Mohammadreza Eslaminejad and
                  Shukor Abd Razak and
                  Mehdi Sookhak},
  title        = {Classification of Energy-Efficient Routing Protocols for Wireless
                  Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {17},
  number       = {1-2},
  pages        = {103--129},
  year         = {2012},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-17-number-1-2-2013/ahswn-17-1-2-p-103-129/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/EslaminejadRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/EslaminejadRI12,
  author       = {Mohammadreza Eslaminejad and
                  Shukor Abd Razak and
                  Abdul Samad Haji Ismai},
  title        = {{EEDARS:} An Energy-Efficient Dual-Sink Algorithm with Role Switching
                  Mechanism for Event-Driven Wireless Sensor Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {10},
  pages        = {2473--2492},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.10.002},
  doi          = {10.3837/TIIS.2012.10.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/EslaminejadRI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AnisiARN12,
  author       = {Mohammad Hossein Anisi and
                  Abdul Hanan Abdullah and
                  Shukor Abd Razak and
                  Md. Asri Ngadi},
  title        = {Overview of Data Routing Approaches for Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {12},
  number       = {4},
  pages        = {3964--3996},
  year         = {2012},
  url          = {https://doi.org/10.3390/s120403964},
  doi          = {10.3390/S120403964},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AnisiARN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/EslaminejadR12,
  author       = {Mohammadreza Eslaminejad and
                  Shukor Abd Razak},
  title        = {Fundamental Lifetime Mechanisms in Routing Protocols for Wireless
                  Sensor Networks: {A} Survey and Open Issues},
  journal      = {Sensors},
  volume       = {12},
  number       = {10},
  pages        = {13508--13544},
  year         = {2012},
  url          = {https://doi.org/10.3390/s121013508},
  doi          = {10.3390/S121013508},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/EslaminejadR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChizariHSRA12,
  author       = {Hassan Chizari and
                  Majid Hosseini and
                  Shaharuddin Salleh and
                  Shukor Abd Razak and
                  Abdul Hanan Abdullah},
  title        = {EF-MPR, a new energy eFficient multi-point relay selection algorithm
                  for {MANET}},
  journal      = {J. Supercomput.},
  volume       = {59},
  number       = {2},
  pages        = {744--761},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11227-010-0470-7},
  doi          = {10.1007/S11227-010-0470-7},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChizariHSRA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-1645,
  author       = {Adeyemi R. Ikuesan and
                  Shukor Abd Razak and
                  Nor Amira Nor Azhan},
  title        = {Identifying critical features for network forensics investigation
                  perspectives},
  journal      = {CoRR},
  volume       = {abs/1210.1645},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.1645},
  eprinttype    = {arXiv},
  eprint       = {1210.1645},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-1645.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChizariHPRA11,
  author       = {Hassan Chizari and
                  Majid Hosseini and
                  Timothy Poston and
                  Shukor Abd Razak and
                  Abdul Hanan Abdullah},
  title        = {Delaunay Triangulation as a New Coverage Measurement Method in Wireless
                  Sensor Network},
  journal      = {Sensors},
  volume       = {11},
  number       = {3},
  pages        = {3163--3176},
  year         = {2011},
  url          = {https://doi.org/10.3390/s110303163},
  doi          = {10.3390/S110303163},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ChizariHPRA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/EissaRN11,
  author       = {Tameem Eissa and
                  Shukor Abd Razak and
                  Md. Asri Ngadi},
  title        = {Towards providing a new lightweight authentication and encryption
                  scheme for {MANET}},
  journal      = {Wirel. Networks},
  volume       = {17},
  number       = {4},
  pages        = {833--842},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11276-010-0318-3},
  doi          = {10.1007/S11276-010-0318-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/EissaRN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wsn/AnisiAR11,
  author       = {Mohammad Hossein Anisi and
                  Abdul Hanan Abdullah and
                  Shukor Abd Razak},
  title        = {Energy-Efficient Data Collection in Wireless Sensor Networks},
  journal      = {Wirel. Sens. Netw.},
  volume       = {3},
  number       = {10},
  pages        = {338--342},
  year         = {2011},
  url          = {https://doi.org/10.4236/wsn.2011.310037},
  doi          = {10.4236/WSN.2011.310037},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wsn/AnisiAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/DezfouliRNR11,
  author       = {Behnam Dezfouli and
                  Marjan Radi and
                  Mohammad Ali Nematbakhsh and
                  Shukor Abd Razak},
  title        = {A Medium Access Control Protocol with Adaptive Parent Selection Mechanism
                  for Large-Scale Sensor Networks},
  booktitle    = {25th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2011, Biopolis, Singapore, March
                  22-25, 2011},
  pages        = {402--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WAINA.2011.124},
  doi          = {10.1109/WAINA.2011.124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/DezfouliRNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/MohammedRHMA10,
  author       = {Asma Ahmed Mohammed and
                  Shukor Abd Razak and
                  Abdul Hanan Abdullah and
                  Izzeldin Mohammed and
                  Yahia Abdella},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Ashu M. G. Solo},
  title        = {A Review on Blackhole Attack in Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the 2010 International Conference on Wireless Networks,
                  {ICWN} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes},
  pages        = {116--121},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Thu, 10 Nov 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/MohammedRHMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-2855,
  author       = {Behnam Dezfouli and
                  Marjan Radi and
                  Shukor Abd Razak},
  title        = {A Cross-Layer Approach for Minimizing Interference and Latency of
                  Medium Access in Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1008.2855},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.2855},
  eprinttype    = {arXiv},
  eprint       = {1008.2855},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-2855.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/RazakFCB08,
  author       = {Shukor Abd Razak and
                  Steven Furnell and
                  Nathan L. Clarke and
                  Phillip J. Brooke},
  title        = {Friend-assisted intrusion detection and response mechanisms for mobile
                  ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {6},
  number       = {7},
  pages        = {1151--1167},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.adhoc.2007.11.004},
  doi          = {10.1016/J.ADHOC.2007.11.004},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/RazakFCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RazakSM08,
  author       = {Shukor Abd Razak and
                  Normalia Samian and
                  Mohd Aizaini Maarof},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Friend Mechanism for Mobile Ad Hoc Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.27},
  doi          = {10.1109/IAS.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RazakSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiams/SamianMR08,
  author       = {Normalia Samian and
                  Mohd Aizaini Maarof and
                  Shukor Abd Razak},
  title        = {Towards Identifying Features of Trust in Mobile Ad Hoc Network},
  booktitle    = {Second Asia International Conference on Modelling and Simulation,
                  {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008},
  pages        = {271--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AMS.2008.113},
  doi          = {10.1109/AMS.2008.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiams/SamianMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/RazakFLB07,
  author       = {Shukor Abd Razak and
                  Steven Furnell and
                  Nathan L. Clarke and
                  Phillip J. Brooke},
  editor       = {Evangelos Kranakis and
                  Jaroslav Opatrny},
  title        = {Building a Trusted Community for Mobile Ad Hoc Networks Using Friend
                  Recommendation},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference,
                  {ADHOC-NOW} 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4686},
  pages        = {129--141},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74823-6\_10},
  doi          = {10.1007/978-3-540-74823-6\_10},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/RazakFLB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/RazakFCB06,
  author       = {Shukor Abd Razak and
                  Steven Furnell and
                  Nathan L. Clarke and
                  Phillip J. Brooke},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks -
                  {A} Friend Approach},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {590--595},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_62},
  doi          = {10.1007/11760146\_62},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/RazakFCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/RazakFB05,
  author       = {Shukor Abd Razak and
                  Steven Furnell and
                  Phillip J. Brooke},
  title        = {A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {271--280},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Mon, 24 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/RazakFB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}